| Commit message (Expand) | Author | Age | Files | Lines |
* | X509_STORE_new(): do not leak memory upon error. | miod | 2014-09-26 | 1 | -14/+17 |
* | X509_issuer_and_serial_hash(): do not leak memory if an error occurs during | miod | 2014-09-26 | 1 | -1/+3 |
* | X509at_add1_attr(): do not free stuff we did not allocate in the error path. | miod | 2014-09-26 | 1 | -3/+3 |
* | Now that we have a static version of the default EC formats, also use it | jsing | 2014-09-26 | 2 | -94/+88 |
* | Fix regression introduced in revision 1.15 by using strndup() instead of | miod | 2014-09-23 | 1 | -6/+6 |
* | Refactor and simplify the ECC extension handling. The existing code | jsing | 2014-09-22 | 4 | -244/+196 |
* | Also check the result from final_finish_mac() against finish_mac_length in | jsing | 2014-09-22 | 2 | -38/+34 |
* | It is possible (although unlikely in practice) for peer_finish_md_len to | jsing | 2014-09-22 | 2 | -26/+22 |
* | Document SSL_OP_TLSEXT_PADDING. | jsing | 2014-09-21 | 1 | -0/+6 |
* | Move the TLS padding extension under an SSL_OP_TLSEXT_PADDING option, which | jsing | 2014-09-21 | 4 | -20/+36 |
* | a_enum.c used to be a copy of a_int.c with s/INTEGER/ENUMERATED/g , but | miod | 2014-09-21 | 1 | -4/+9 |
* | Fix a memory leak in the error path in ASN1_mbstring_ncopy(). | miod | 2014-09-21 | 1 | -19/+29 |
* | Add CHACHA20 as a cipher symmetric encryption alias. | jsing | 2014-09-19 | 2 | -2/+10 |
* | remove obfuscating parens. man operator is your friend. | tedu | 2014-09-19 | 4 | -30/+30 |
* | Remove SSL_kDHr, SSL_kDHd and SSL_aDH. No supported ciphersuites use them, | jsing | 2014-09-07 | 16 | -182/+54 |
* | Move openssl(1) from /usr/sbin/openssl to /usr/bin/openssl, since it is not | jsing | 2014-08-26 | 55 | -33619/+0 |
* | constify strerror return value | bcook | 2014-08-24 | 1 | -2/+2 |
* | Include <sys/time.h> to get struct timeval | bcook | 2014-08-24 | 1 | -1/+2 |
* | Include <sys/select.h> to get select | bcook | 2014-08-24 | 4 | -4/+9 |
* | Let SSL_CIPHER_description() allocate the buffer for the description, | jsing | 2014-08-24 | 1 | -4/+6 |
* | Replace the remaining uses of ssl3_put_cipher_by_char() with s2n and a | jsing | 2014-08-24 | 10 | -58/+38 |
* | Remove non-standard GOST cipher suites (which are not compiled in | jsing | 2014-08-23 | 2 | -136/+2 |
* | Replace the remaining ssl3_get_cipher_by_char() calls with n2s() and | jsing | 2014-08-23 | 8 | -80/+60 |
* | Three independent typos for `independent' or `independently'. | miod | 2014-08-19 | 1 | -1/+1 |
* | replace more ROTATE macros with plain-old C code. | bcook | 2014-08-18 | 2 | -40/+19 |
* | remove return value from HOST_c2l/l2c macros | bcook | 2014-08-18 | 8 | -106/+106 |
* | fixed overrid(d)en typo | tobias | 2014-08-14 | 1 | -2/+2 |
* | Merge a patch that i successfully pushed to OpenSSL, | schwarze | 2014-08-12 | 2 | -2/+2 |
* | Replace intrinsic ROTATE macros with an inline. | bcook | 2014-08-12 | 1 | -41/+10 |
* | Guard RSA / RC4-5 ASM when NO_ASM is not defined | bcook | 2014-08-11 | 2 | -5/+6 |
* | Check the return value of sk_SSL_CIPHER_new_null(), since it allocates | jsing | 2014-08-11 | 2 | -10/+14 |
* | Unchecked memory allocation and potential leak upon error in | miod | 2014-08-11 | 2 | -10/+24 |
* | Remove now-unused SSL2_STATE as well as ssl2-specific state machine values. | miod | 2014-08-11 | 2 | -234/+2 |
* | Currently, ssl3_put_char_by_bytes(NULL, NULL) is just a long handed way | jsing | 2014-08-11 | 6 | -26/+24 |
* | Provide a ssl3_get_cipher_by_id() function that allows ciphers to be looked | jsing | 2014-08-11 | 6 | -30/+36 |
* | Tweak cipher list comments and add missing cipher value comments. | jsing | 2014-08-10 | 2 | -10/+52 |
* | Remove disabled (weakened export and non-ephemeral DH) cipher suites from | jsing | 2014-08-10 | 2 | -940/+10 |
* | Since we no longer need to support SSLv2-style cipher lists, start | jsing | 2014-08-10 | 32 | -182/+68 |
* | Fix CVE-2014-3507, avoid allocating and then leaking a fresh fragment | guenther | 2014-08-08 | 2 | -4/+14 |
* | Fix CVE-2014-3508, pretty printing and OID validation: | guenther | 2014-08-08 | 2 | -12/+28 |
* | Correct test reversed during merge of fix for CVE-2014-3509 | guenther | 2014-08-07 | 2 | -4/+4 |
* | Fix CVE-2014-3506, DTLS handshake message size checks. From | guenther | 2014-08-07 | 2 | -32/+44 |
* | Oops, revert changes commited by mistake. The previous commit was supposed | miod | 2014-08-07 | 13 | -53/+59 |
* | When you expect a function to return a particular value, don't put a comment | miod | 2014-08-07 | 15 | -71/+59 |
* | Fix CVE-2014-3511; TLS downgrade, verbatim diff | deraadt | 2014-08-07 | 2 | -10/+54 |
* | merge CVE-2014-3510; Fix DTLS anonymous EC(DH) denial of service | deraadt | 2014-08-07 | 2 | -2/+18 |
* | merge fix for CVE-2014-3509 -- basically a missing s->hit check; ok guenther | deraadt | 2014-08-06 | 2 | -18/+26 |
* | Prevent a possible use after free by mimicing the s3_srvr.c fixes contributed by | miod | 2014-08-06 | 2 | -8/+2 |
* | Allow B64_EOF to follow a base64 padding character. This restores previous | jsing | 2014-08-06 | 1 | -2/+3 |
* | Correct error checks in EVP_read_pw_string_min(): UI_add_input_string() | guenther | 2014-08-06 | 1 | -3/+3 |